#DoS
A DoS Attack is a Denial of Service attack.
This means that one computer and one internet connection is used to flood a server with packets (TCP / UDP). The point of such a denial of service attack is to overload the targeted server’s bandwidth and other resources. This will make the server inaccessible to others and blocking the website or whatever else is hosted there.

#DDoS
A DDoS Attack is a Distributed Denial of Service Attack.In most respects it is similar to a DoS attack but the results are much different. Instead of one computer and one internet connection the DDoS attack utilises many computers and many connections. The computers behind such an attack are often distributed around the whole world and will be part of what is known as a botnet. The main difference between a DDoS attack vs a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter.
Therefore it is much, much harder for a server to withstand a DDoS attack as opposed to the simpler DoS incursion

Types of #DDoS Attacks

DDoS – Denial of Service

Volume Based Attacks – This type of attack includes UDP floods, ICMP floods, and other spoofed packet floods. The goal of this DDoS attack is to saturate the bandwidth of the attacked site. The magnitude of a volume-based attack is usually measured in Bits per second.
Protocol Attacks – This type of DDoS attack consumes the resources of either the servers themselves, or of intermediate communication equipment, such as routers, load balancers and even some firewalls. Some examples of protocol attacks include SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. Protocol attacks are usually measured in Packets per second.

Application Layer Attacks –
Perhaps the most dangerous type of DDoS attack, application layer attacks are comprised of seemingly legitimate and innocent requests. The intent of these attacks is to crash the web server. SDome examples of application layer attacks include Slowloris, Zero-day DDoS attacks, DDoS attacks that target Apache, Windows or OpenBSD vulnerabilities and more. The magnitude of this type of attack is measured in Requests per second.

Today I’ve just decided to converse/talk/blog; just decided to give it to you right quick. Just read through, may help a brother or a sister out there *Giggling* of course I will be blogging about technology {Programming} let’s not get sentimental here =)
I want to give my first five quick tips to everyone who is starting programming to kind of get a general sense of what it is {am so not keeping count, am writing this straight from the brain, if they are more or less, just embrace it *Grinning*}. I only knew about programming when I got hold of a programming e-book. Like most of you who got to hear about it and learn it in college, on my side that wasn’t the case. I had to learn it on my own. I didn’t like how I was being taught by most of the e-books as in they were teaching you certain computer programming languages but they weren’t teaching you the concept of what programming is in general(am so sure this happens in colleges too).
My first quick tip is this: don’t look at computer programming as a set of commands or functions, look at it as a problem solving tool, that’s all it is. You are just trying to solve a problem and you have a tool that allows you to solve a problem, that’s all it is, look at it as a problem solving tool and when you look at it that way then later on when you know let’s say five programming languages then you will be able to choose a specific one out of those five to solve each specific problem because different problems require different types of solutions. One type of problem needs more speed, another problem needs a different type of sorting algorithm and different programming languages have different functions for those. Some will work faster, some will work slower so once you look at it, just look at it as a problem solving tool.
Second tip is that: you shouldn’t mix; you should start with one programming language and stick with that. I would personally recommend you start from C++, that is what I did but you can really start from anything you want: you can start from visual basic, you can start from PHP, you can start from anything and C++ is just my preference. I think it’s good you start from that because it’s pretty challenging and you learn all the basics, all the fundamentals stuff like the pointers and everything else and that is good; for me it was good. For you it might be better to start from Java *Smiling* I don’t know but the bottom line is this-you have to start from one programming language and don’t incorporate everything else together cause that is just going to confuse you. You’ve got to learn the syntax of one programming language, learn all the functions of it and how it works, get a general sense of the whole thing. I’d say dedicate at least two years, *runs fingers through the hair* okay at least one year but I’d say two years, dedicate it to one programming language so you know it fully. Once you do that then you can move to another programming language. That’s what I did when I was finished with Java I moved on to PHP I think and it took me a month to learn, to just get a sense of how it works, just to learn how it function, tracks and how to make the variables plus all those small stuffs. The reason is because I already knew the concept of programming and besides I was already confortable with one programming language. The thing with programming is that all programming languages is that they share a lot of similarity, I mean there’s different syntaxes, there’s different functions in this and that but most of the stuff is very similar, so once you learn one language, learning another is not that difficult; so definitely do that.

Third is: Please keep your code clean. There is a tendency, when I was starting the program; there is this tendency to over complicate code because in a way you want to write a lot of code {you get excited ““OOo0oHH””I just want to with a lot of code}, it’s good in a way cause that means you’re passionate about it but what’s bad about it: you end up with a SPAGHETTI CODE. A spaghetti code is very difficult to understand at the end, when you write a code and you try to come back to maintain or debug or do whatever else you want with the code, it’s very difficult to do that. Try to keep it very clean, by clean I mean use understandable variable names but don’t make them too long, your function names once again don’t make them too long, it should be like this: when you’re looking at that page, you shouldn’t be scrolling to the right all the time, what I mean by that- it has to be short because sometimes you know you have this conditional statement which goes on and on, you have to break it down. If something is too long you have to break it down, if something is too complicated, you have to break it down. If you see something is getting way too complicated, you have to break it down, that’s rule thumb, you’ve got to think of another way to do it because if it’s really that complicated it: its to come back at you later on when you’re trying to debug it or connect it to another program or whatever else you are trying to do.
The other thing I’ve got to tell you {Fourth tip}, a lot of the beginners don’t test their code before moving on, what I mean by that is this: when you are writing a couple lines of code, please test it, please debug it, please makes sure it works{You will thank me later}. Here is what happens, you write a code, you think it works *smirking* you are confident that’s going to work because you think that’s what you wrote but there is so many times you write a code that you meant to do something but actually does something else. Later on you find that out and it takes you so long, it’s a tedious process. It’s a tedious process because you haven’t checked it when you wrote it so every time when you’re writing a couple lines of code just go over make sure it’s right, debug it, and test it. This is important especially when you are doing a huge project and it has like thousands line of code, at the end imagine there’s a little syntax problems or dialogical problem it’s going to very difficult to find later on. ~Write and test ~Write and Test ~Write and Test~ with experience you might write thirty or forty lines of code before testing, not that because you are confident, you are sure because you have done it so many times.
The very last tip is this, this is not really for beginner computer programmers, this is really for people who are trying to make a decision if they should get into programming or not, so here is my advice {this goes beyond the scope of programming, it relates to life in general} but I will say this if you don’t love programming, don’t get into it-Am neither being rude nor mean here, am just trying to save you money and time. Students drop out of colleges and universities, the reason being that they thought that programming; they heard from someone that computer programming/computer engineering brings you lots of money. Students drop out because they can handle it; the reason is because computer programming is not like in the movies where you type a couple of “things”, then break into their system and get all the money *Giggling*-It’s not like that I mean, it takes a lot of time to go over a code, to think about the problem, to plan it out then write a code, go over it and make sure the code is clean. It takes so much patient, it takes so much time, it’s overwhelming at times; you have to really love it. You have to really love, not programming but problem solving in general, you have to love it in order to enjoy programming, in order to get a job and not get sick of it after like *grinning* forty years you know, be able to constantly develop and that is only going to happen if you love it. As I say it goes for everything, money should be your reason.
I know I said I was going to give you five tips, and my last one is really important. When you read a problem don’t just jump into writing the code; it’s not right, I mean it’s always going to fail you and you always going to get mad at the end {I have done that; it’s not good}. When you’re reading a problem, try to understand the requirements {I know it sounds very cliché but you know this is true}, when you get to the problem try to understand the requirements, try to understand what it wants. Draw a chart, try to see the data flow where one thing flows and where it ends up, how does it change, you know try to connect them; try to see it on your mind. Try to plan it out, see it very clearly. Once you have the solution on your mind, you know exactly how to solve it, and then proceed to programming it. You see if you don’t do that it’s going to go back to messy code; because you are going to be solving it as you are writing it and that’s not good, you’re kind of winging it, that’s not good, that’s not planned. You have to plan it first because when it’s planned, then you’ll have a much clear code, much organized code and it will work and that’s really the most important thing.

1. BINDER – is a software
used to bind or combine two or more files in one file under one name and extension. The files to be binded can have any extension or icon. The user has choice to select the name, icon and various attributes of binded file. If binded file contains an application (in our case – RAT or keylogger), the
application is also run when the actual binded file is run.thus Binder is used to for the following things
– To Hide Files (Key loggers, Rats , Viruses )
– To Bypass antivirus
detection.Download Here

2. CRYPTER – is a software
used to hide our viruses,
keyloggers or tools from
antiviruses so that they are not detected by antiviruses.
Thus, a crypter is a program that allow users to crypt the source code of their program.
Generally, antivirus work by splitting source code of
application and then search for certain string within source code. If antivirus detects any certain malicious strings, it either stops scan or deletes the file as virus from system.
Crypter simply assigns
hidden values to each
individual code within
source code. Thus, the source code becomes hidden. Hence, our crypted file becomes UD (undetactable ) or FUD* (fully undetectable )
*UD means undetected, so
only a few antivirus
programs detect it. FUD
means fully undetected, so no antivirus detects itDownload Here

Remember that all the stuff is published here is only for educational purpose! 😛

Tired of those usage limits
your ISP gives you? Pissed
that you cant play games or use Facebook because it is blocked by your net provider?
Don’t worry, thanks to this
article you will be able to use unlimited and un-censored internet in no time.

What is your ISP?

ISP stands for Internet
service provider in more
simpler terms it is the
company that gives you
internet service.There are
many ISP for example –
Verizon, Vodafone, BSNL
etc. ISP also monitors your
usage activity and disconnects you when you
exceed your given use limits.
What are “WE” going to do?
We are going to orchestrate an special service/hack called “Tunneling” which will. create a fake “virtual” road where your data will travel.

First of all download the
setup files for “Your Freedom Client” and “Java”, don’t install them yet. Now go to “Your Freedom Client” website and register a new account, use fake info for all the fields. except country, also use fake. e-mail adress. Note down the username and passwords for your freedom client, we will use them later.
Now install java, disconnect your internet then install your freedom client (tunneling software).
Install the client with default settings. SKIP the wizard that comes up after the installation.

How to use it?

~Setting it up:

1). You will see a your
Freedom Open window. Click on “Configure”
2). Go to “Account
Information” tab. Enter your “Your Freedom” username and password. Note: 1 account of “Your Freedom”. works for only 3 hours a day, thats why i told you to make multiple fake accounts.

3). Then go to the “Server
Connection” tab. Select
“Connection Mode” as “UDP”. Then click on the “Wizard”.

4). Now this wizard will
search for all the servers
available and show the by a priority list, the ones on top means they are best for you.

5). When the wizard completes, it will show many servers which can be used for proxy tunneling. Choosing the first server is recommended.
The first server has the
maximum speed and
acuracy. Then click on
“Finish”. Then click on “Save and Exit”.

6). Click (right) on the “Your Freedom” icon (the closed door) on the “Notification Area” and click on “Start Connection”. Your proxy
connection will be started.

7). You don’t have to read
this point unless you use
Internet Explorer…For
Internet Explorer you have to change the settings. Go To -> Menu Bar go to Tools >> Internet Options >>
Connections Tab >> LAN
Settings. Set proxy address as “localhost” (without “) and port 8080. You need to configure the same even if you are using any other browser. Press OK and Start Browsing.. But remember, every time you start your computer, Start Freedom Connection from Notification area and then only start the internet. Otherwise the bytes will be counted.

#Warning –
This trick is only tunneling,and if your isp is smart it will detect it or would have already detected it, use CAUTION. This article is only for educational purpose ]:-)
…works on 70% of the ISP!
Enjoy!

As a European citizen I find this, to say the least, very disturbing and hope that my country and all other European countries will do something to stand up against this blatant violation of users privacy.

The reason why I say European countries should do something about this is that I have truly lost hope in any kind of resolution coming out of the U.S. From the information made public it appears that the people that had the power to stop this have failed to do so and they appear to not have any kind of interest in working towards a resolution that both protects national security, but also citizens privacy.

The aspect that I personally find most interesting about this matter is the…

1. FaceNiff
FaceNiff is an Android app that allows you to sniff and intercept web session profiles. over the WiFi that your mobile is connected to. It is possible to hijack sessions. only when WiFi is not using. EAP, but it should work over any private networks. (Open/WEP/WPA-PSK/WPA2-PSK) It’s kind of like Firesheep for android.
Maybe a bit easier to use (and it works on WPA2!).
Download FaceNiff : http://­adfoc.us/15213026344318

3. WifiKill
Well, with this app you can disable internet connection for a device on the same network. So if someone (anyone) is abusing the internet wasting precious bandwidth for a Justin Bieber videoclips you could just kill their connection and stay happy with a full bandwidth just for yourself.
Download Wifi Kill : http://­adfoc.us/15213026451422